Research
Lawyers, Bugs, and Money: When Bug Bounties Went Boom (Decipher)
For as long as there have been computers, there have been bugs. That’s damn near 100 years and an uncountable number of bugs. If they were discovered at all, most of those bugs w... More
Convergent Risks Restarts On-Site TPN Security Assessments
Convergent Risks, a provider of security, risk and compliance services for the media and entertainment industry, has announced renewed availability of on-site Trusted Partner Netwo... More
Data Breach Costs at Record High, Zero Trust, AI, Automation Help Reduce Costs (Security Intelligence)
Remote working and digital transformation were rushed by necessity during the pandemic. With security lagging behind, that increased the cost of a data breach. Organizations that p... More
Top Reasons That Crash Livestreams (BuyDRM Blog)
Engineers are always looking for new and better ways to stream large events. Whether you're streaming a live event on Facebook or YouTube Live, or using your custom-built video str... More
A Quick Guide to Decentralized Identity and Its Benefits (Avanade Insights)
Although identity systems have improved, with the introduction of multiple factors for authentication, the fundamental issue of proving a stranger’s identity remains.... More
Attacks on Operational Technology From IBM X-Force, Dragos Data (Security Intelligence)
The research shows that ransomware and remote access Trojans are the most common attack types against enterprise networks connected to OT networks.... More
Splunk Named Market Share Leader in ITOM, SIEM Reports
While the worst of COVID-19 will hopefully soon be behind us, the need to continuously transform our digital environment is unequivocally here to stay. ... More
Cyber Insurance Isn’t Helping With Cybersecurity, and Might be Making the Ransomware Crisis Worse (ZDNet)
Allowing organizations to claim back ransom payments could be making the problem of ransomware worse - but cyber insurance could be used to help improve security, says new research... More
Manufacturers are in the Crosshairs of Cybercriminals (INTRUSION Blog)
Researchers identified that the top vulnerabilities were information leakage, insufficient session expiration, cross-site scripting, insufficient transport layer protection, and co... More
How the Rise of the Remote SOC Changed the Industry (Security Intelligence)
What does the rise of remote security operations centers (SOCs) mean for cybersecurity jobs? The longer people work from home during the pandemic, the more they rate remote working... More
Why Cybersecurity Research is Now More Important Than Ever (TechRadar)
Cybersecurity is no longer the fringe discipline of IT that it might have been 30 years ago. It now touches every aspect of our lives, every single day. Some estimate that by 2025,... More
Cyberweek 2020 Attracted Both Online Shoppers, DDoS Attackers (Akamai Blog)
2020 has shown both record busting bps and pps attacks and the most prolific DDoS extortion campaign recorded by Akamai. This holiday season is ripe with pent-up online shopping de... More
Meet the Hackers Who Earn Millions for Saving the Web, One Bug at a Time (ZDNet)
These hackers are finding security bugs – and getting paid for it. That's changing the dynamics of cybersecurity.... More
Why Cybersecurity, AI are Top Governance Risks for Board Directors, CEOs (Forbes)
Today bringing key business stakeholders across the enterprise with diverse skill sets ranging from: human resources, legal, business, technology, security - all with a unified mis... More
Email is Still a Hacker’s Wonderland (CIO Dive)
Half of hacked email accounts are compromised for less than 24 hours, according to a new report. The majority of attackers, 78%, stayed within email accounts, suggesting cloud-base... More
Tamr Receives Inaugural Phase 5 Award From Department of Homeland Security (CDSA)
With an eye on adapting solutions to new applications, the Department of Homeland Security Science and Technology Directorate’s expanded its Silicon Valley Innovation Program by ... More
Securing the New Remote Workforce (Illumio Blog)
Recent change means the workforce isn’t interacting with the IT estate in the same way it was a few months ago. The perimeter in 2020 includes personal devices, home routers, sma... More
The Dark Web: Behind the Mystery and Preserving Privacy (Verdict)
The dark web is renowned for being the leading marketplace for all kinds of dirty deals, with stolen data being among the most coveted of purchases.... More
Addressing Security Holes to Protect Valuable Content (NAGRA Blog)
In today’s M&E industry, to remain competitive, you must stay on your toes when it comes to innovation and evolution. From pay-TV operators to broadcasters and content owners, th... More
Winning in the New Era of Digital Regulation (CPO)
The pace and complexity of regulatory requirements continues to grow globally, with no sign of slowing. For businesses, the challenges are not just that new regulations are being p... More